ClickFix Deception: Hackers Use SharePoint and Graph API to Deploy Havoc Malware

Amber | Attack Report
Download PDF

A recently discovered ClickFix phishing campaign is luring victims into running malicious PowerShell commands, which ultimately deploy the Havoc framework to establish remote access on compromised devices. Havoc, an open-source tool available on GitHub, allows attackers to easily modify its code, helping them evade detection. To conceal their malware delivery process, the threat actors host each infection stage on a SharePoint site, leveraging a modified version of Havoc Demon for stealth. Once successfully deployed, the attackers gain full control over infected systems, enabling them to execute further malicious actions undetected.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox

Cyber Horizons 2025

What Last Year’s Attacks Reveal About Today’s Risks

Watch the Webinar on-demand and get a FREE copy of our Cyber Horizons 2025 report.

Our Speakers
Speaker 1

Prateek Bhajanka Global Field CISO & Former Gartner Analyst Hive Pro Inc.

Speaker 2

Ankit Mani Manager Threat Intel HiveForce Labs

Speaker 3

Sreevani Tonipe Senior Threat Researcher HiveForce Labs